CVE-2023-29187
low-risk
Published 2023-04-11
A Windows user with basic user authorization can exploit a DLL hijacking attack in SapSetup (Software Installation Program) - version 9.0, resulting in a privilege escalation running code as administrator of the very same Windows PC. A successful attack depends on various preconditions beyond the attackers control.
Do I need to act?
-
0.14% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.7/10
Medium
LOCAL
/ HIGH complexity
Affected Products (1)
Sapsetup
Affected Vendors
References (4)
Permissions Required
https://launchpad.support.sap.com/#/notes/3311624
Permissions Required
https://launchpad.support.sap.com/#/notes/3311624
23
/ 100
low-risk
Severity
17/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal